Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
A strong multiple designated verifiers signature (SMDVS) enables a signer to convince a set of verifiers by generating one signature, of which the verification needs a private key of a verifier. After a brief survey of current SMDVS schemes, we find no schemes suitable to a broadcast propagation, where the simulation needs only one verifier's private key. Motivated by this discovery, we propose a broadcast SMDVS scheme. The new scheme is proven secure in the random oracle model.
Czasopismo
Rocznik
Tom
Strony
297--315
Opis fizyczny
Bibliogr. 21 poz., il.
Twórcy
autor
autor
- 1School of Information Science and Technology, Sun Yat-Sen University, Guangzhou, 510275, China, sysutianhb@gmail.com
Bibliografia
- Bellare, M. and Neven, G. (2006) Multi-Signatures in the Plain Public-Key Model and a General Forking Lemma. In: Proceedings of the 13th ACM Conference on CCS, Alexandria, Virginia. ACM Press, 390-399.
- Chang, T.Y. (2011)An ID-based Multi-signer universal designated Multi-verifier signature scheme. Information and Computation, 209(7), 1007-1015.
- Chow, S.S.M. (2006)Identity-based Strong Multi-Designated Verifiers Signatures. Lecture Notes in Computer Science, 4043, 257-259.
- Chow, S.S.M. (2008)Multi-Designated Verifiers Signatures Revisited. International Journal of Network Security, 7(3), 348-357.
- Desmedt, Y. (2003)Verifier-Designated Signatures. In: Rump Session of CRYPTO 2003, Santa Barbara, California. Springer.
- Jakobsson, M., Sako, K. and Impagliazzo, R. (1996) Designated Verifier Proofs and Their Applications. Lecture Notes in Computer Science, 1070, 143-154.
- Laguillaumie, F. and Vergnaud, D. (2004)Designated verifiers signature: anonymity and efficient construction from any bilinear map. Lecture Notes in Computer Science, 3352, 107-121.
- Laguillaumie, F. and Vergnaud, D. (2004)Multi-Designated Verifiers Signatures. Lecture Notes in Computer Science, 3269, 495-507.
- Laguillaumie, F. and Vergnaud, D. (2007)Multi-designated Verifiers Signatures: Anonymity without Encryption. Information Processing Letters, 102(2-3), 127-132.
- Li, Y., Susilo, W., Mu, Y., and Pei, D. (2007) Designated Verifier Signature: Definition, Framework and New Constructions. Lecture Notes in Computer Science, 4611, 1191-1200.
- Ming, Y. and Wang, Y. (2008)Universal designated multi verifier signature scheme without random oracles. Wuhan Univ. J. Nat. Sci., 13(6), 685-691.
- Ng, C.Y., Susilo, W. and Mu, Y. (2005) Universal designated multi verifiers signature schemes. In: Proceedings of the ICPADS 2005, Fukuoka, Japan. IEEE, 305-309.
- Rivest, R.L., Shamir, A. and Tauman, Y. (2001) How to leak a secret. Lecture Notes in Computer Science, 2248, 552-565.
- Saeednia, S., Kramer, S., and Markovitch, O. (2004)An efficient strong designated verifier signature scheme. Lecture Notes in Computer Science, 2971, 40-54.
- Schnorr, C.P. (1990)Efficient identification and signatures for smart cards. Lecture Notes in Computer Science, 435, 239-252.
- Seo, S.H., Hwang, J.Y., Choi, K.Y. and Lee, D.H. (2008) Identity-based universal designated Multi-verifiers signature schemes. Comput. Standards & Interfaces, 30(5), 288-295.
- Shailaja, G., Kumar, K.P. and Saxenh, A. (2006)Universal designated multi verifier signature without random oracles. In: Proceedings of the ICIT 2006, Bhubaneswar, India. IEEE, 168-171.
- Steinfield, R., Wang, H. and Pierprzyk, J. (2004)Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures. Lecture Notes in Computer Science, 2947, 86-100.
- Ushida, M., Izu, T., Takenaka, M. and Ohta, K. (2010) Multiple Designated Verifiers Signatures Reconsidered. In: Proceedings of the fifth International conference on Availability, Reliability and Security, Kraków, Poland. IEEE, 586-590.
- Vergnaud, D. (2008) New Extensions of Pairing-based Signatures into Universal (Multi) Designated Verifier Signatures. Lecture Notes in Computer Science, 4052, 58-69.
- Wu, Q., Mu, Y., Susilo, W., Qin, B., and Domingo-Ferrer, J. (2009) Asymmetric Group Key Agreement. Lecture Notes in Computer Science, 5479, 153-170.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BATC-0009-0047